Master Password: An Offline Password Manager That Doesn’t Require Syncing
I’m currently testing these new privacy-friendly tools in the GreyCoder lab…
I’m currently testing these new privacy-friendly tools in the GreyCoder lab…
Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. Update 2021: I recommend the Ledger Nano X as a best hardware wallet now.
Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to …
Saudi Arabia has very strong internet filtering and blocking. However, it is possible to bypass these blocks with a VPN or “virtual private network”. This is a service that encrypts and redirects all your internet connections.
There are several countries around the world that heavily censor the internet (China, Iran, UAE, Oman, Pakistan, etc.). Typically, they block the internet using two techniques:
Tretflix is a pre-installed and pre-configured application and OS environment that runs on any standard x86 desktop or server. It runs inside a virtual machine (such as the free VMWare ESXi v5.0+). It contains popular Usenet tools configured for an easy “out of the box” user experience. When combined with the built-in Plex Media Server, …
What the most popular and least popular numbers used for PINs? The answer is here. In this heatmap image above, the x-axis depicts the left two digits from [00] to [99] and the y-axis depicts the right two digits from [00] to [99]. The bottom left is 0000, and the top right is 9999. Color …
What Are The Most Popular and Least Popular PINs? Read More »